Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Misc. >> ICECast AVLlib remote buffer overflow


Vulnerability Assessment Details

ICECast AVLlib remote buffer overflow

Vulnerability Assessment Summary
Check icecast version

Detailed Explanation for this Vulnerability Assessment

The remote server runs a version of ICECast, an open source
streaming audio server, which is older than version 1.3.12.

This version is affected by a remote buffer overflow because it does
not properly check bounds of data send from clients.

As a result of this vulnerability, it is possible for a remote attacker to
cause a stack overflow and then execute arbitrary code with the privilege of the server.

*** Nessus reports this vulnerability using only
*** information that was gathered.

Solution : Upgrade to a newer version.
Network Security Threat Level: High

Networks Security ID: 4415

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak

Cables, Connectors

1984 Apple MACINTOSH Model M0001 128K 1st Mac WORKING Set and Picasso Kit NICE
$1999.84
1984 Apple MACINTOSH Model M0001 128K 1st Mac WORKING Set and Picasso Kit NICE pictureVTG Balance of Power Game Computer Mac 128K Apple Chris Crawford 1985 Mindscape
$89.99
VTG Balance of Power Game Computer Mac 128K Apple Chris Crawford 1985 Mindscape pictureApple Keyboard with Numeric Keypad M0110A for Macintosh Mac 128k, 512k, Plus
$20.0
Apple Keyboard with Numeric Keypad M0110A for Macintosh Mac 128k, 512k, Plus pictureMac 128k - 512k Boot / Diagnostics 2 Disk Set
$14.99
Mac 128k - 512k Boot / Diagnostics 2 Disk Set picture


Discussions

No Discussions have been posted on this vulnerability.